Posted on 10/01/2015 6:24:16 PM PDT by Utilizer
Researchers have discovered a second set of serious vulnerabilities in Google's Android mobile operating system, leaving over a billion new and old devices open to attack.
Dubbed Stagefright 2.0, the newly discovered vulnerabilities stem from two flaws in how Android handles audio and video files.
It was found by Joshua Drake of security vendor Zimperium, who also discovered the original Stagefright vulnerability affecting just under a billion Android devices in July this year.
The first Stagefright flaw in the Android media processing software library allowed attackers to send a specially crafted multimedia messaging service (MMS) missive which, when received in Google's Hangouts and Messenger apps, would allow attackers to run arbitrary code on victims devices without user interaction.
(Excerpt) Read more at itnews.com.au ...
Stagefright 1.0 performed by The Band in the film “The Last Waltz”:
https://www.youtube.com/watch?v=ZIfKkV77lqM
Putting my age on display - I was there when they taped it. I was stunned to see a DVD of it in a store labelled “Classics.”
Great job Apple and Microsoft.
Shockwave/Flash is malware for any device.
Ping to the Apple list, ThunderSleeps to ping the Android list, dayglored for the Windows list, and Shadow Ace for the Tech list. . .
Unfortunately, it is used on many websites so browsers have to have ways to deal with it, and most smartphones use it as well which makes this bug doubly troublesome.
This is for the Windows users who have Android devices -- you know who you are!
Thanks to Swordmaker for the ping!!
The logo source file has moved or been deleted from its original location at http://ragzon.com/wp-content/uploads/2015/08/Android-logo-4.jpg
All one gets there is a 404.
You are going to have to find another Android robot logo. . .
Since Google has gone to a monthly update scheme for the Nexus line, they've set a new standard for the Android industry, one which will also pressure handset makers and carriers to follow along in the not so distant future.
Beyond, it shows the problem with carrier locked devices; users are kept from needed updates by this unnecessary restriction.
I expect that Dolphin will likely be one of the first browsers to use alternate libraries for mp3 & mp4 files, and an update to Google Chrome (and the dependent libraries) will be pushed out with the Marshmallow release.
It is to be noted that these are lab discovered vulnerabilities and no exploits of a 5 year old problem have ever been found in the wild, plus any Android device with 4.0 or higher uses randomized memory locations, so turning this exploit into something useful is rather doubtful to begin with.
Got it, thanks. I’ll give it a try next ping!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.